[keycloak-user] KeycloakConfigResolver vs. unprotected resources
Bystrik Horvath
bystrik.horvath at gmail.com
Mon Feb 1 10:06:45 EST 2016
Hi Bill,
thank you for response. I use Adapter deployed in Keycloak 1.7.0. So I need
then somehow propagate the list of unprotected (or protected) resources to
the KeycloakConfigResolver implementation by my own and return from
resolve(...) method when unprotected URIs is accessed.
Best regards,
Bystrik
On Mon, Feb 1, 2016 at 3:26 PM, Bill Burke <bburke at redhat.com> wrote:
> Depends on the adapter. Some/most platforms, the authenticator gets
> executed irregardless.
>
> On 2/1/2016 4:08 AM, Bystrik Horvath wrote:
>
> Hello,
>
> I have an application that is part of several realms. That's why I
> implemented the KeycloakConfigResolver and it works fine.
> I observed that the KeycloakConfigResolver implementation gets called even
> when unprotected resources of the application are requested. Is there a
> (recommended) way how to avoid it? Or do I do something wrong?
>
> Thank you for the answer.
>
> Best regards,
> Bystrik
>
>
> _______________________________________________
> keycloak-user mailing listkeycloak-user at lists.jboss.orghttps://lists.jboss.org/mailman/listinfo/keycloak-user
>
>
> --
> Bill Burke
> JBoss, a division of Red Hathttp://bill.burkecentral.com
>
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/keycloak-user/attachments/20160201/ac592cbb/attachment.html
More information about the keycloak-user
mailing list